AOH :: P24-13.TXT

Phrack World News XXIV Part 3 of 3


                                ==Phrack Inc.==

                     Volume Two, Issue 24, File 13 of 13

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN                Issue XXIV/Part 3                PWN
            PWN                                                 PWN
            PWN                February 25, 1989                PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


The Judas Contract Fulfilled!                                  January 24, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    "...the other thing that made me mad was that I consider myself, at
     least I used to consider myself, a person who was pretty careful
     about who I trust, basically nobody had my home number, and few
     people even knew where I really lived..."

                                                 -The Disk Jockey

The following story, as told by The Disk Jockey, is a prime example of the
dangers that exist in the phreak/hack community when sharing trust with those
who have made The Judas Contract.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Let me briefly explain how I got caught...

A hacker named Compaq was busted after someone turned him in for using Sprint
codes.  While executing the search warrant, the state police noticed that he
had an excessive amount of computer equipment which had origins that Compaq
could not explain.

After checking around (I imagine checking serial numbers that Compaq had not
removed), the police found that the equipment was obtained illegally.  Compaq
then proceeded to tell the police that I, Doug Nelson (as he thought my name
was) had brought them to him (true).

Meanwhile, Compaq was talking to me and he told me that he was keeping his
mouth shut the entire time.  Keep in mind that I had been talking to this guy
for quite a long time previously and thought that I knew him quite well.  I
felt that I was quite a preceptive person.

As time went by, little did I know, Compaq was having meetings again and again
with the state police as well as the Federal Bureau of Investigation (FBI)
concerning finding out who I was.  He gave them a complete description of me,
and where I (correctly) went to school, but again, he was SURE my name was
Douglas Nelson, and since my phone had previously been in that name, he felt
assured that he was correct.  The Police checked with Illinois and couldn't
find license plates or a driver's license in that name.  He had remembered
seeing Illinois license plates on my car.

They were stuck until Compaq had a wonderful:  He and I had went out to dinner
and over the course of conversation, I mentioned something about living in
Bloomfield Hills, Michigan.

After telling the state police this information, they wrote to Bloomfield Hills
and gave a description and asked for any pictures in their files that fit that
description.

The problem was that several years ago, some friends and I were arrested for
joyriding in a friend's snowmobile while he was on vacation.  The neighbors
didn't know us and called the police.  Charges were dropped, but our prints and
pictures were on file.

Bloomfield Hills sent back 12 pictures, which, according to the police report,
"Kent L. Gormat (Compaq) without hesitation identified picture 3 as the
individual he knows as Douglas Nelson.  This individuals name was in fact
Douglas..."

A warrant was issued for me and served shortly afterwards by state, local and
federal authorities at 1:47 AM on June 27, 1988.

Lucky me to have such a great pal.  In the 6 months that I was in prison, my
parents lived 400 miles away and couldn't visit me, my girlfriend could come
visit me once a month at best, since she was so far away, and Compaq, who lived
a whole 10 miles away, never came to see me once.  This made me rather angry as
I figured this "friend" had a lot of explaining to do.

As you can see I am out of prison now, but I will be on probation until
December 15, 1989.
                                                 -The Disk Jockey
_______________________________________________________________________________

Bogus Frequent Flyer Scheme                                   February 13, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Associated Press

An airline ticket agent piled up 1.7 million bonus air miles via computer
without leaving the ground, then sold the credits for more than $20,000,
according to a published report.

Ralf Kwaschni, age 28, was arrested Sunday when he arrived for work at Kennedy
International Airport and was charged with computer tampering and grand
larceny, authorities said.

Kwaschni, a ticket agent for Lufthansa Airlines, used to work for American
Airlines.  Police said he used his computer access code to create 18 fake
American Airline Advantage Accounts - racking up 1.7 million bonus air miles,
according to the newspaper.

All 18 accounts, five in Kwaschni's name and 13 under fake ones, listed the
same post office box, according to the newspaper.

Instead of exchanging the bonus miles for all the free travel, Kwaschni sold
some of them for $22,500 to brokers, who used the credits to get a couple of
first class, round trip tickets from New York to Australia, two more between
London and Bermuda, and one between New York and Paris.  It is legal to sell
personal bonus miles to brokers Port Authority Detective Charles Schmidt said.

Kwaschni would create accounts under common last names.  When a person with one
of the names was aboard an American flight and did not have an Advantage
account, the passengers name would be eliminated from the flight list and
replaced with one from the fake accounts.

"As the plane was pulling away from the gate, this guy was literally wiping out
passengers," Schmidt said.
_______________________________________________________________________________

Massive Counterfeit ATM Card Scheme Foiled                    February 11, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Douglas Frantz (Los Angeles Times)

The U.S. Secret Service foiled a scheme to use more than 7,700 counterfeit ATM
cards to obtain cash from Bank of America automated tellers.  After a
month-long investigation with an informant, five people were arrested and
charged with violating federal fraud statutes.

"Seized in the raid were 1,884 completed counterfeit cards, 4,900 partially
completed cards, and a machine to encode the cards with Bank Of America account
information, including highly secret personal identification numbers for
customers."

The alleged mastermind, Mark Koenig, is a computer programmer for Applied
Communications, Inc. of Omaha, a subsidiary of U.S. West.  He was temporarily
working under contract for a subsidiary of GTE Corporation, which handles the
company's 286 ATMs at stores in California.  Koenig had access to account
information for cards used at the GTE ATMs.  According to a taped conversation,
Koenig said he had transferred the BofA account information to his home
computer.  He took only Bank Of America information "to make it look like an
inside job" at the bank.  The encoding machine was from his office.

Koenig and confederates planned to spread out across the country over six days
around the President's Day weekend, and withdraw cash.  They were to wear
disguises because some ATMs have hidden cameras.  Three "test" cards had been
used successfully, but only a small amount was taken in the tests, according to
the Secret Service.

The prosecuting US attorney estimated that losses to the bank would have been
between $7 and $14 million.  Bank Of America has sent letters to 7,000
customers explaining that they will receive new cards.
_______________________________________________________________________________

STARLINK - An Alternative To PC Pursuit                        January 24, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
STARLINK is an alternative to PC Pursuit.  You can call 91 cities in 28 states
during off-peak hours (7pm-6am and all weekend) for $1.50 per hour.  All
connections through the Tymnet network are 2400 bps (1200 bps works too) with
no surcharge and there are no maximum hours or other limitations.

There is a one time charge of $50 to signup and a $10 per month account
maintenance fee.  High volume users may elect to pay a $25 per month
maintenance fee and $1.00 per hour charge.

The service is operated by Galaxy Telecomm in Virginia Beach, VA and users may
sign up for the service by modem at 804-495-INFO.  You will get 30 minutes free
access time after signing up.

This is a service of Galaxy and not TYMNET.  Galaxy buys large blocks of hours
from TYMNET.  To find out what your local access number is you can call TYMNET
at (800) 336-0149 24 hours per day.  Don't ask them questions about rates,
etc., as they don't know.  Call Galaxy instead.

Galaxy says they will soon have their own 800 number for signups and
information.

The following is a listing of the major cities covered.  There are others that
are a local call from the ones listed.


Eastern Time Zone

Connecticut:  Bloomfield  Hartford  Stamford
Florida: Fort Lauderdale  Jacksonville  Longwood  Miami  Orlando  Tampa
Georgia: Atlanta  Doraville  Marietta  Norcross
Indiana: Indianapolis
Maryland: Baltimore
Massachusetts: Boston  Cambridge
New Jersey: Camden  Englewood Cliffs  Newark  Pennsauken  Princeton  South
            Brunswick
New York:  Albany  Buffalo  Melville  New York  Pittsford  Rochester
           White Plains
North Carolina: Charlotte
Ohio:  Akron  Cincinnati  Cleveland  Columbus  Dayton
Pennsylvania: Philadelphia  Pittsburgh
Rhode Island: Providence
Virginia: Alexandria  Arlington  Fairfax  Midlothian  Norfolk  Portsmouth


Central Time Zone

Alabama: Birmingham
Illinois: Chicago  Glen Ellyn
Kansas: Wichita
Michigan: Detroit
Minnesota: Minneapolis  St. Paul
Missouri: Bridgeton  Independence  Kansas City  St. Louis
Nebraska: Omaha
Oklahoma: Oklahoma City  Tulsa
Tennessee: Memphis  Nashville
Texas: Arlington  Dallas  Fort Worth  Houston
Wisconsin:  Brookfield  Milwaukee


Mountain Time Zone

Arizona: Mesa  Phoenix  Tucson
Colorado:  Aurora  Boulder  Denver


Pacific Time Zone

California:  Alhambra  Anaheim  El Segundo  Long Beach  Newport Beach
             Oakland  Pasadena  Pleasanton  Sacramento  San Francisco
             San Jose  Sherman Oaks  Vernon  Walnut Creek
Washington:  Bellevue  Seattle


STARLINK is a service of Galaxy Telecomm Division, GTC, Inc., the publishers of
BBS Telecomputing News, Galaxy Magazine and other electronic publications.
_______________________________________________________________________________

Suspended Sentences For Computer Break-In                     February 20, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Personal Computing Weekly

      "Police Officers Sentenced For Misuse Of Police National Computer"

Three police officers hired by private investigators to break into the Police
National Computer received suspended prison sentences at Winchester Crown
Court.  The private investigators also received suspended (prison) sentences,
ranging from four to six months.

The police officers were charged under the Official Secrets Act of conspiring
to obtain confidential information from the Police National Computer at Hendon.

One of the police officers admitted the charge, but the other two and the
private investigators pleaded Not Guilty.

The case arose out of a Television show called "Secret Society" in which
private investigator Stephen Bartlett was recorded telling journalist Duncan
Campbell that he had access to the Police National Computer, the Criminal
Records Office at Scotland Yard and the DHSS (Department of Health & Social
Security).

Bartlett said he could provide information on virtually any person on a few
hours.  He said he had the access through certain police officers at
Basingstoke, Hampshire.  Although an investigation proved the Basingstoke
connection to be false, the trail led to other police officers and private
detectives elsewhere.

Most of the information gleaned from the computers was used to determine who
owned certain vehicles, who had a good credit record -- or even who had been in
a certain place at a certain time for people investigating marital infidelity.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Of course, the actions for which the officers and others were sentenced, were
not computer break-ins as such, but rather misuse of legitimate access.
_______________________________________________________________________________

Virus Hoax Caused As Much Panic As The Real Thing             February 20, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Popular Computing Weekly

                         "A Virus Is Up And Running"

Michael Banbrook gave his college network managers a scare when he planted a
message saying that a virus was active on the college system.

Banbrook's message appeared whenever a user miskeyed a password; the usual
message would be

                       "You are not an authorized user."

It was replaced by the brief but sinister:

                         "A Virus is up and running."

When the message was discovered by the college network manager, Banbrook was
immediately forbidden access to any computers at the St. Francix Xavier College
at Clapham in South London.

Banbrook, 17, told "Popular Computing Weekly" that he believed the college
has over-reacted and that he had, in fact thrown a spotlight on the college's
lackluster network security.  The college has a 64 node RM Nimbus network
running MS-DOS.

"All any has to do is change a five-line DOS batch file" says Banbrook.
"There is no security at all"

Banbrook admits his motives were not entirely related to enhancing security:
"I was just bored and started doodling and where some people would doodle with
a notepad, I doodle on a keyboard.  I never thought anyone would believe the
message."

Banbrook was suspended from computer science A-level classes and forbidden to
use the college computers for a week before it was discovered that no virus
existed.  Following a meeting between college principal Bryan Scalune and
Banbrook's parents, things are said to be "back to normal."
_______________________________________________________________________________

Phrack World News -- Quicknotes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For those interested in the 312/708 NPA Split, the correct date for this
division is November 11, 1989.  However, permissive dialing will continue until
at least February 9, 1990.
-------------------------------------------------------------------------------
Anyone who is wondering what Robert Morris, Jr. looks like should have a look
at Page 66 in the January 1989 issue of Discover Magazine.
_______________________________________________________________________________

d telecommunications and
the increasing reliance on this equipment by American and
international business create a potential for serious harm," he
said.

Authorities said they discovered the scheme last December after a
Rolling Meadows real estate broker reported that hackers had
invaded his company's voicemail system and changed passwords.

Authorities said they traced the calls into the Rolling Meadows
voicemail system to telephones in private homes in Chicago,
Columbus, Ohio, and suburban Detroit, Atlanta and Boston.

Checks on those phones led them to voicemail systems in companies
around the country, they said.

[For more information see Phrack World News XXVII/Part One and
the article entitled, "Computer Intrusion Network in Detroit,"
dated as May 25, 1989 --KL]
_______________________________________________________________________________

Phreaks Abuse East St. Louis Phone Card
September 24, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ East
St. Louis, IL, a dirt-poor minority suburb of the larger Missouri
city by the same name was victimized for several months by
phreaks without realizing it until the phone bills for a one year
period were audited recently.

According to a recent story in the Belleville, IL
(News-Democrat), the city is being billed for phone calls to
dial-a-porn services and from points as far flung as Florida and
Texas.

The monthly phone bill for the city of East St. Louis averages
$5000, and over the past year it has included calls to nearly
every state as well as to "900" area adult talk lines.  City
Treasurer Charlotte Moore said the number of questionable calls
in each month's phone bill, which is usually two inches thick,
shows the "need for better policing of phones."

No kidding!  The (News-Democrat) obtained copies of the phone
bill for several months under the Freedom of Information Act, and
set about reviewing the places and people called.  For example,
from March through May of this year, hundreds of dollars in calls
were made from places in Texas, Florida and elsewhere, and
charged to a Calling Card number assigned to the city.

In one instance, a caller in northern Florida made a 288-minute
call to Miami that cost East St. Louis $39.27.  The
(News-Democrat) called the Miami number, and reached a man named
John, who refused to give his last name, and claimed he "...had
never even heard of East St. Louis..."

Calls from one certain number in Houston to places all over the
United States accounted for more than $1000 in charges over
several months.  A man who answered the phone at the Houston
number refused to give his name and refused to discuss the
matter, or explain how his phone might have been used for the
fraudulent calls.

Prior to intervention by the newspaper, the city had done
nothing.  Apparently they were not even aware of the abuse.  On
notification, the local telco cancelled all outstanding PINS, and
issued new ones.  Meanwhile, the city of East St. Louis continues
to plead poverty.  They are barely able to meet payroll for city
employees, and have skipped a couple of paydays at that.  The
city has an extremely poor tax base, and will likely file
bankruptcy in the near future.
_______________________________________________________________________________

The Cuckoo's Egg
October 1, 1989 ~~~~~~~~~~~~~~~~
    The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer
         Espionage by Cliff Stoll, Doubleday, 1989, ISBN
         0-385-24946-2 ($19.95)

          Book Review by Louise Bernikow, Cosmopolitan, October
1989

Here is a first -- the true story of a man who notices a
seventy-five cent discrepancy in a computer's accounting system
and runs the error down until it leads to a real live spy ring.
Even if you don't know a byte from a bagel, this book will grip
you on page one and hold you as ferociously as the best mystery
stories.

It is astrophysicist-turned-systems-manager Cliff Stoll's first
week on the job at a lab in Berkeley, California.  The error
turns up, and he tries to figure out why, partly as an exercise
in learning about the computer system he's going to be working
with.  Almost immediately, he discovers that somebody had been
breaking into the computer network using a fake password.  That
discovery leads him to other break-ins in other computers,
including some in military installations.  He alerts the FBI,
which, since he has lost neither half a million dollars nor any
classified information, says, "Go away, kid."

Stoll presses on, sleeping under his desk at night, monitoring
the system -- a hound waiting for the fox to come out in the
open.  There is suspense aplenty, but it's the intensely human,
often funny voice of the man on the trail that makes this book so
wonderful.  Stoll's girlfriend, Martha, a law student, seems like
one smart and delightful cookie, and she puts up with his
obsession pretty well.  In the end, Stoll becomes a national
hero.  The play-by-play is nothing short of fascinating.

                  [I wonder if anyone got those cookies --KL]
_______________________________________________________________________________

Hackwatch Spokesman Charged
October 2, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from Computing
Australia

Self-styled computer security expert Paul Dummett, alias Stuart
Gill, has been charged with making false reports to the Victoria
Police following an investigation into claims he made in the
daily media late in 1988 and early this year.  The articles often
quoted Gill, introducing himself as a spokesman for either
"Hackwatch" or the "DPG monitoring service".

Gill claimed hackers in Australia had gained access codes from
others in the US and lifted $500,000 (US) from the International
Citibank, United States.  Other claims include credit card
numbers had been posted on bulletin boards for BBS users' access;
drugs, including steroids, were being sold using bulletin boards;
evidence of this had been given to the police by informers; and
in response, the police had raided several hackers' homes.  The
police, including the Criminal Investigation Bureau and the Fraud
Squad's Computer Section, repeatedly denied the claims.

Gill had disappeared, but returned again on September 22 and was
charged in the Frankston Magistrates' Court under his real name,
Paul Dummett.  According to court documents, police investigating
Dummett's claims allegedly found Citibank's computer network had
not been illegally accessed on its New York number as Dummett had
claimed.  When Dummett appeared in court his legal aid counsel
Serge Sztrajt applied successfully to adjourn the case until
October 20.  Dummett did not enter a plea.
_______________________________________________________________________________

                                PWN Quicknotes ~~~~~~~~~~~~~~ 1.
                                Hire A Hacker? -- "Some very
                                notable people in the computer
    industry started out as hackers tinkering around in a
    mischievous fashion," Ron Gruner, president of Alliant
    Computer Systems Corporation told Computerworld why he would
    probably hire Robert T. Morris Jr., of Cornell and creator of
    Internet worm.  - - - - - - - - - - - - - - - - - - - - - - -
    - - - - - - - - - - - - - - - - - 2.  Computer Hackers Rip
    Off Corporate 800 Lines -- Computer hackers pride themselves
    on never having to pay for long distance calls.  How do they
    do it?  Sam Daskam, president of Information Security
    Association (ISA), explains:  Hackers call corporate numbers
    until they find one with an automated switchboard.  The
    fingers do not do the walking.  Automatic caller software is
    used.  Then they link their computer to try all combinations
    of three or four-digit numbers until they find one which
    connects them to the company's outside toll or 800 line.
    Once they get a dial tone, they can make calls anywhere at
    the firm's expense.  Taken from the Security Letter 1989.  -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    - - - - - - - - 3.  900 Service Considered -- There has been
    talk among some companies about switching from using the 800
    toll free numbers to 900 numbers since the ease of use of the
    900 numbers has been shown so vividly.  This would save the
    corporations a large degree of money.  - - - - - - - - - - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.
    Grocery Store "Hackers" Sell Drugs And Women -- The VMB
    (voice mailbox) system of a wholesale grocer in Los Angeles
    was commandeered to a small band of "hackers," who used the
    system to run a prostitution ring and disseminate data about
    drugs.  Finally, valid VMB users complained that they could
    not use the service since their passwords were invalidated.
    An investigation disclosed that the "hackers" overrode
    security features and acquired 200 VMBs for their own use.  -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    - - - - - - - - 5.  Phone Phreaks Busted In Upstate New York
    -- Once again it seems that Syracuse, New York is ripe for
    the picking for law officials to grab hackers involved
    computer related crimes.  In August the Federal
    Communications Commission (FCC) put a local area police
    sergeant in charge of contacting a list of local computer
    users that were using a local long distance service that
    offered national and international calling.

    It seems that one user of the service contacted the company
    about a large bill, $10,000, that he received.  The company
    then put a trap on the code and accumulated a list of
    unauthorized users to that code.  So far the local
    authorities, the state police, and the FBI have been brought
    in on the case.  They have been interviewing those on the
    list and so far most have cooperated fully with the police
    (most offenders are underage).  One user called Gunter has
    even allowed the police to use his computer bbs accounts.
    The service used by those caught (25 people) where to place
    long distance calls to France, Dominican Republic, Kenya, and
    Germany.  The callers also used the service to call locally
    in Syracuse, as one person said that it cleaned up the line
    noise.  - - - - - - - - - - - - - - - - - - - - - - - - - - -
    - - - - - - - - - - - - - 6.  Bulletin Board Scanning Saves
    Boy (August 24, 1989) --Undercover police in San Jose,
    California, have been watching bulletin boards for several
    years, looking for computer users who boast about their
    criminal exploits.  It was such activity that led them to
    Virginians Dean Ashley Lambey, 34, and Daniel T. Depew, 28,
    who have been accused of conspiring to kidnap a young boy to
    be filmed as they molested him and then killed him.  (Article
    by Tracie L. Thompson of the San Francisco Chronicle.) - - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    - - - - - - 7.  German Hackers Attempt To End Smoking (August
    29, 1989) -- On Saturday, August 26, 1989, ZDF (the second
    German television station and one of the 2 nationwide
    television channels) asked their viewers whether they thought
    smoking should be banned in public areas.  The viewers could
    reply by telephone, dialing one telephone number for "yes"
    and another telephone number for "no."  Within a time frame
    slot of 14 minutes, 52,942 telephone calls came in, with a
    ratio of 54:46 in favor of prohibiting smoking.  This means
    that 29,669 voted in favor of a prohibition, and 25,273
    opposed it.

    On Monday, August 28, 1989, a group of South German hackers
    claimed to have manipulated the quota by dialing the "yes"
    number with 83 personal computers at a rate of 4 times a
    minute; virtually all of their calls came through so that
    about the maximum of 4,648 "yes" votes came from their
    computers.  These circumstances led to new results in the
    poll: "Yes" = 25,021 and "No" = 25,273, giving the "no" group
    a small majority.

                           Story by Klaus Brunnstein - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- 8.  Immigration Chief Proposes National Computer Screen (June
22,
    1989) --LA JOLLA, CA, -- The Commissioner of Immigration and
    Naturalization, Alan C. Nelson, today proposed a nationwide
    computer system to verify the identities of all job
    applicants in order to halt the widespread use of fraudulent
    documents by illegal aliens seeking jobs.

    Mr. Nelson also suggested standardized identity cards for
    immigrants so as to get fuller compliance with a 1986 law
    prohibiting employment of illegal aliens.

    Creating a national identity card and other ways of checking
    legal status or identity have been repeatedly suggested in
    Congress as tools in fighting unlawful immigration, but have
    also been consistently rejected as potential infringements on
    civil liberties.

    The national computerized database on everybody is one bad
    idea that simply refuses to stay dead, no matter how many
    times we drive a stake through its heart -- if the INS didn't
    resurrect it, the drug czar or the FBI would.  "Eternal
    vigilance..."

                    Story by Roberto Suro (New York Times) - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - 9.  West German Computer Hackers Accused Of Spying For
Soviets
    (Aug. 17, 1989) -- Associated Press (Frankfurt) -- Three
    computer hackers, suspected of giving the Soviet Union
    information from military and industrial computers worldwide,
    have been indicted on espionage charges, prosecutors said
    yesterday.  The West German government called the breakup of
    the spy ring, which gave the KGB secret data from 12
    countries, including the United States, "a major blow" to the
    Soviets.  In a four-page statement, Kurt Rebman, the chief
    federal prosecutor, said it was the first time his office had
    prosecuted hackers for endangering national security.  Taken
    from the Boston Globe - - - - - - - - - - - - - - - - - - - -
    - - - - - - - - - - - - - - - - - - - - 10. Challenge To
    Phreaks! (August 31, 1989) -- Nippon Telegraph & Telephone
    Corp. (Tokyo) is offering a $7,000 reward to any person or
    organization that can invade its FEAL-8 private communication
    and data system, according to an Associated Press report that
    NTT America Inc. officials could not confirm.  The reward
    offer supposedly expires 8/31/91.  No telephone number or
    other information was included.  Taken from the Wall Street
    Journal.  - - - - - - - - - - - - - - - - - - - - - - - - - -
    - - - - - - - - - - - - - - 11. Shadow Stalker Loses Out
    (August 7, 1989) -- A 17-year-old Michigan boy has been
    charged with posting stolen long-distance telephone codes on
    a bulletin board system operated in his home.  Brent G.
    Patrick, alias "Shadow Stalker" online, was arraigned this
    week on one count of stealing or retaining a financial
    transaction device without consent.  Patrick was released on
    $2,500 bond, pending his hearing.  The youth faces a maximum
    of four years in prison and a $2,000 fine if convicted.  His
    bulletin board, Wizard Circle, has been closed.  - - - - - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    - - - 12. Philadelphia Hackers Change Speed Limit -- Recently
    an unknown hacker got into the computer that controlled the
    speed limit on the Burlington-Bristol Bridge.  He proceeded
    to change the speed limit from 45 m.p.h. to 75 m.p.h. A lot
    of people were stopped and ticketed and judges say they will
    not hear any appeals because, "the public should know better
    than that no matter what the sign says."  The police claim to
    have leads, however this is doubtful.  - - - - - - - - - - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 13.
    Two Story Jump To Escape From Secret Service (July 26, 1989)
    -- Red Rebel, a known hacker in Florida was busted by the
    United States Secret Service and local authorities.  It seems
    that in attempt to to escape he actually jumped out a second
    story window and ran for a while.  The Secret Service
    confiscated two computers and a load of disks.

    To make matters worse, similar to Oryan QUEST, Red Rebel is
    not an American citizen and is likely to be deported.  Red
    Rebel is charged with resisting arrest, interfering with
    evidence, and something concerning credit card fraud.
    Information provided by The Traxster.  - - - - - - - - - - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 14.
    Fraud Alert (September 1989) -- PBX fraud is busting out all
    over.  Long distance carriers are being overwhelmed by
    corporate customers demanding refunds for fraud perpetrated
    on them.  No long distance carrier covers their customer's
    long-term fraud.  If you got fraud you got to pay.  This is
    not like stolen credit cards.  This is real serious stuff.
    Thieves are dialing into 800 INWATS lines and, via auto
    attendants, hacking their way to overseas.  The big calls go
    to drug-related countries, especially Colombia, Pakistan,
    Dominican Republic, and Ecuador.  But no one really knows
    which countries are drug-related and which aren't.  Taken
    from Teleconnect Magazine.  - - - - - - - - - - - - - - - - -
    - - - - - - - - - - - - - - - - - - - - - - - 15. Motorola
    Introduces Network Encryption System (August 4, 1989) --
    Motorola Government Equipment Group (GEG) has introduced its
    Network Encryption System (NES), which features the latest in
    security services for the protection of Local Area Networks
    (LANs).  Designed in accordance with Secure Data Network
    System (SDNS) standards including SDNS electronic key
    management, the NES is a flexible internet security solution
    for Type I applications.

    The NES is unique in COMSEC technology because the protocol
    software is loaded via diskette.  The NES is installed in the
    drop cable between the computer and the transceiver, or as a
    gateway device separating a LAN from a backbone network.  The
    product supports both DoD and ISO internet standards allowing
    protection over wide area networks.

    The initial product accommodates connection to IEEE 802.3 and
    IEEE 802.4 medias.  Motorola Inc. has a Memorandum of
    Agreement with the National Security Agency and anticipates
    product endorsement in the first quarter of next year.  The
    LAN product represents the first of a family of SDNS products
    that will provide complete, interoperable system security
    solutions.  Additional information on the NES can be obtained
    from Joe Marino at (602) 441-5827.  - - - - - - - - - - - - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - 16. The
    Death of Shadow 2600:  No Accident (July 6, 1989) -- The
    following is a message taken from The Central Office:

                     89Jul06 from fdg @ The Central Office

    MY CONDOLENCES TO DAVE FLORY'S FAMILY AND FRIENDS.  Do you
    all realize WHY a 22 year old died?  It says one thing to me.
    He was killed by some insane ex-CIA types.  Most likely under
    orders from the idiots who tried to prosecute him in 1985.
    This kind of thing is getting more common under President
    Bush.  He ran the CIA, and he is now encouraging the same
    dirty tricks to silence people who cause "problems."  Abbie
    Hoffman was done in the same way.  A small hypodermic full of
    prussic aced.  You will hear about more ex-hippies, yippies,
    and hackers/phreaks dying mysteriously in the foreseeable
    future.

    You have been warned.  And who am I to know all this?
    Believe me, friends, I am highly placed in the government.
    You will see more friends die.  You may laugh now, but I
    decided to leave a public message in hopes of saving a few
    lives.
                           Special Thanks to Epsilon
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17. Legion Of Doom Members Raided In Atlanta (July 21, 1989) --
    The Leftist, The Urvile, and The Prophet, all of the world
    famous hacking group known as the Legion of Doom, were raided
    on July 21, 1989.  The day in question is interesting because
    two years prior, that was the same day that a nationwide
    sweep netted over 80 hackers across the country including
    famous names such as Oryan QUEST, Solid State, and Bill From
    RNOC.

    The charges against the LOD members range from toll fraud to
    illegal entry into government computer systems, although as
    it is told, the government systems were entered by the Urvile
    and the other two had nothing to do with it.  Currently, all
    three LOD-Atlanta members are still waiting to find out what
    will happen to them as charges have not yet been brought
    against them, very similar to what happened to the hackers in
    1987.

    It has been said by security personnel at Michigan Bell that
    these LOD busts were a spinoff of the supposed arrest of Fry
    Guy on July 19 for his role in the Delray Beach, Florida
    probation officer scam (detailed last issue).  It is believe
    that he had been working closely with LOD-Atlanta (especially
    The Leftist) and when caught for the probation office scam,
    he got scared and turned over what he knew about LOD.
_____________________________________________________________________


nces for as much as
    3,500 yen.

    Sakaki also sold about 320 tampered cards for about 2 million yen.

    One of the presiding judges ruled that using tampered telephone cards on
    public telephones is the same as misleading Nippon Telegraph and
    Telephone Corporation into believing the cards -- false securities -- were
    genuine.  Taken from The Japan Times
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7.  Computer Virus Hits Japanese Quake Data (October 30, 1989) -- Tokyo; A
    computer virus has destroyed information at the University of Tokyo's
    seismological and ocean research institutes, a university official and
    local reports said yesterday.

    An official of the university's Ocean Reasearch Institute said the virus
    was detected earlier this month in five of the center's 100 computers,
    but was believed to have first infected the computers in September.

    The virus was found only in personal computers being used by researchers
    and not major computer systems, the official said, requesting anonymity.
    He said the damage was not serious.

    He declined to discuss further details, but a report by the Japan
    Broadcasting Corporation said a virus had also been found in the computers
    at the university's Earthquake Research Institute.  Thanks to Associated
    Press news services.  (Related article follows)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
8.  First Virus Attack On Macintoshes In Japan (November 7, 1989) -- Six Macs
    in University of Tokyo, Japan, were found to have caught viruses.  Since
    Since this September, Professor K. Tamaki, Ocean Research Institute,
    University of Tokyo, has noticed malfunctions on the screen.  In October,
    he applied vaccines "Interferon" and "Virus Clinic" to find his four
    Macintoshes were contaminated by computer viruses, "N Virus" type A and
    type B.  He then found ten softwares were also infected by viruses.  A
    Macintosh of J. Kasahara, Earthquake Research Institute, University of
    Tokyo, was also found to be contaminated by N Virus and Score Virus.  These
    are the first reports of real viruses in Japan.

    Later it was reported that four Macintoshes in Geological Survey of Japan,
    in Tsukuba, were infected by N Virus Type A.  This virus was sent from
    United States together with an editor.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9.  Hackers Can Tap Into Free Trip (October 1989) -- Attention Hackers:  Here
    is your chance to break into a computer system and walk away with a grand
    prize.  The "hacker challenge" dares any hacker to retrieve a secret
    message stored in a KPMG Peat Marwick computer in Atlanta.

    This challenge is being sponsored by LeeMah DataCom Security Corporation, a
    Hayward, California, consulting firm that helps companies boost computer
    security.  The winner gets an all-expense paid trip for two to either
    Tahiti or St. Moritz, Switzerland.

    Hackers with modems must dial 1-404-827-9584.  Then they must type this
    password: 5336241.

    From there, the hacker is on his own to figure out the various access codes
    and commands needed to retrieve the secret message.

    The winner was announced October 24, 1989 at the Federal Computer Show in
    Washington.  Taken from USA Today.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
10.  Groaning Phone Network Survives Millions Of Calls (October 18, 1989) --
     The nation's telecommunications network was flooded Tuesday (October 17)
     night by an estimated 20 million attempted telephone calls from people
     around the nation concerned about friends and family after the earthquake
     in the bay area.

     Except for brief failures, the system did not break down under the record
     load in the areas damaged by the earthquake.

     AT&T officials said that as many as 140 million long-distance phone calls
     were placed Wednesday (October 18), the highest number for a single day in
     history.  Excerpts thanks to John Markoff (New York Times)

                        >--------=====END=====--------<


AOH Site layout & design copyright © 2006 AOH